General

  • Target

    5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9

  • Size

    5.0MB

  • Sample

    240527-p8d4fsee33

  • MD5

    565346a9c4918db105a2f4194f073799

  • SHA1

    0b84e69da43c075ae1ead56eb41c3ab1f7283cbd

  • SHA256

    5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9

  • SHA512

    9135ecce2c0468089893d750d26e90155c6dea5ac8767a624127fcf8276f4b4b878ae01aa65828e0390cf5075e15b3b90dd62e0a1d0c93a9550b6c437e957237

  • SSDEEP

    24576:kF91qyLvDkqTbwbJVEiddwzF1yznjfJHM/9EVwddPOgh4C2mLUGUBsxsRwxqDKF:kNzLIq/wnEQdYF1g8oBsxsRwxqDy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9

    • Size

      5.0MB

    • MD5

      565346a9c4918db105a2f4194f073799

    • SHA1

      0b84e69da43c075ae1ead56eb41c3ab1f7283cbd

    • SHA256

      5a56b0b41a7ef759358b6f817ffdf9a86d6509375b66327ab9a86bb2c26357e9

    • SHA512

      9135ecce2c0468089893d750d26e90155c6dea5ac8767a624127fcf8276f4b4b878ae01aa65828e0390cf5075e15b3b90dd62e0a1d0c93a9550b6c437e957237

    • SSDEEP

      24576:kF91qyLvDkqTbwbJVEiddwzF1yznjfJHM/9EVwddPOgh4C2mLUGUBsxsRwxqDKF:kNzLIq/wnEQdYF1g8oBsxsRwxqDy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks